Going Virtual? Keep One Eye On The Hardware And The Other On Habits

Going Virtual? Keep One Eye On The Hardware And The Other On Habits

Going Virtual? Keep one eye on the hardware and the other on habits

Central to the huge trade and education event called VMWorld is the notion that everything is going virtual in a big way. Terms such as virtualization and software defined networking are now becoming mainstream, or more more precisely, must now become mainstream, and the 22,000+ conference attendees are listening and talking intently. VMWorld CEO Pat Gelsinger, as well as VMWorld Hybrid Cloud SVP Bill Fathers, and others demonstrated during the Monday morning opener that not only is virtualization crucial to the commercial success of organizations moving forward, but many key players including eBay and GE have already embraced it.
Iddo Kadim

This comes as no surprise to experts like Iddo Kadim, Director of Datacenter Technologies for Intel. He points out that this is no mere swing on the roundabout, a repetition of the growth of mainframe or networked technologies from previous eras; it is now a matter of scale across more than just the physical dimension. The high-tech environment has grown to a size where management of it has gone far beyond simply being a hardware issue. “The manual processes that are required to manage it the old way,” he says, “can’t keep up with the growth that is required to satisfy the demand for compute, storage and networking.” As an example he adds, “you can count 100 jelly-beans, even if it takes time to get it right. But try counting 10,000.”

Kadim states that in this newest of new ages, there needs to be a desegregation of control from physical infrastructure. There needs to be an automated, separated place where software resides a layer above the hardware itself, in order to facilitate multiple operating systems and applications.

He points out that there still exists great deal of confusion with the term cloud, let alone virtualization. Executives, he said, must be careful not to get carried away. As with all major change, they might find untenable risks to their business if issues of control are managed separately, such as by a third party provider who, by owning the information, essentially owns the business.

In makes sense, he says, for organizations to first build a private cloud. By doing this they can virtualize the separate elements and grown and scale as needed. He describes this as a type of automation umbrella: “build internally with an awareness for an eventual hybrid cloud later.”

Kadim also made an excellent point about the inevitable abstraction that comes from virtualization. Even as a company builds a virtualization strategy, at end of day, the applications still work on hardware – they work differently, and more dynamically, but machines are still there, somewhere. That means that to have real control, decision-makers still need to have information about their infrastructure. They still need to say, “these are my walls, these are my machines.” Even though the data and the processing have become virtual, adequate information in on the mechanical is essential.

CloudTweaks asked Kadim for his thoughts regarding the recent outages suffered by Amazon, Google, Apple, and Sony, and how this affects public perception and acceptance of major technological leaps forward such as those we now face. He echoed the sentiments of many leaders in the virtualization community, including Simon Crosby, ex of Intel and Citrix, and now founder of and CTO of Bromium, who, at Interop 2011 stated that cloud technology, in terms of reliability and safety, is much like commercial airlines, in that big planes do not go down very often, and when they do, the results can be painful, but overall, the cloud remains safer than IT infrastructure, as planes are when compared to private cars.

Bad things happen, Kadim continues, even when redundancy is built in, when there is a confluence of events. Sometimes the failure is total, and other times it is partial, as in the example of Netflix, where some services blacked out but others remained. The bottom line, he says is that there must be clear communication between a company and its cloud vendors – clear dialog, and clear understanding. As with many other areas of life, it is up to the customer to establish the rules and to demand clarity, to ensure that loss of control or of data or even presence is unlikely and never total.

There are many providers out there who will start to offer virtualization services to align with the growth in demand. Some will come from a hosting background and will build an enterprise mindset. Others will embrace the Amazon model: a blank infrastructure with an impressive partner ecosystem, which is built well, with other well-built services included on top.

Kadim warns that as organizations large and small move into the new world of software defined networking, effectively separating the intelligence from the hardware, that they do so without falling prey to either hype or outdated mindsets.

Mr. Kadim and other brilliant minds are here with CloudTweaks at the VMWorld 2013 conference in San Francisco. The conference repeats in Barcelona in October.

By Steve Prentice

Post is sponsored by Hitachi and MaximizeYourIT.com

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

Find out more
View All Articles

Sorry, comments are closed for this post.

Comic
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Significant Emerging Technologies To Lookout For In 2017

Significant Emerging Technologies To Lookout For In 2017

Emerging Technologies The entire world is being transformed right before our eyes. Emerging technologies are developing at break-neck speeds, and the global community needs to be prepared for what lies in the horizon. As with anything new or evolving there is benefit versus risk to consider. Most of the up-and-coming technologies that will soon affect…

In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Rounding Out Your Security Strategy With The Enterprise Cloud

Rounding Out Your Security Strategy With The Enterprise Cloud

Enterprise Cloud Security Strategy No company wants to be the one to have to announce one of the world’s biggest data breaches. From managing networks and datacenters to protecting hundreds of applications, today’s enterprises face enormous challenges. With all the surface area that needs to be tracked and protected including APIs on the front-end, customer integrations…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

5 Things To Consider About Your Next Enterprise File Sharing Solution

5 Things To Consider About Your Next Enterprise File Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of sports teams to improving science and research, even helping to aid law enforcement. Amazon Web…

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors A recent BI Intelligence report claimed that the Internet of Things (IoT) is on its way to becoming the largest device market in the world. Quite naturally, such exponential growth of the IoT market has prompted a number of high-profile corporate investors and smart money VCs to bet highly…

Why Small Businesses Need A Business Intelligence Dashboard

Why Small Businesses Need A Business Intelligence Dashboard

The Business Intelligence Dashboard As a small business owner you would certainly know the importance of collecting and analyzing data pertaining to your business and transactions. Business Intelligence dashboards allow not only experts but you also to access information generated by analysis of data through a convenient display. Anyone in the company can have access…

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Off Premise Corporate Data Storage Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud storage services—such as Dropbox, Box, OneDrive—which are also known as hosted,…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…